Help - Search - Members - Calendar
Full Version: Shadowrun 4: Hacking & Rigging
Dumpshock Forums > Discussion > Shadowrun
Pages: 1, 2, 3, 4, 5, 6, 7, 8, 9, 10
hahnsoo
QUOTE (Vector)
But in AR you can still open windows to nodes, right? And you could still hop from one node to another just like you could in VR, you're just constrained to meat speeds, right?

If not, I must have missed something when I read through the Matrix chapter... frown.gif

In AR, any virtual information is overlayed on real-world objects within your vision/perception. While you can open windows to other nodes that are not within your vision, why would you hack into multiple targets just to get to a person that may or may not be within the scanning range of the hacked device, when you can just go VR and "fly around" to where he is (without making any hacking rolls from node to node)? It would be inconvenient to go limp in the middle of a shopping mall, I suppose, but it would be equally as inconvenient to try to hack through multiple nodes to finally get to a node that is actually within scanning range of your target (considering the low signal rating that the majority of consumer electronics has, you'll have problems doing this).

This all assumes that 1) You do not have your target's datatrail 2) You have no idea of the physical location of the target 3) The target is using a commlink 4) The target is out of range of your own commlink. If the target has bought or sold something recently, you can use Track to fulfill number 1 (you have his datatrail now). If you knew the physical location of the target, the point would be moot to do the above complicated steps. If the target isn't using a commlink, you wouldn't be able to track his PAN (but you might be able to find any RFIDs on his person). If the target is within range of your commlink, just roll a Data Search + Scan Extended test to find him.
Vector
QUOTE (hahnsoo)
In AR, any virtual information is overlayed on real-world objects within your vision/perception. While you can open windows to other nodes that are not within your vision, why would you hack into multiple targets just to get to a person that may or may not be within the scanning range of the hacked device, when you can just go VR and "fly around" to where he is (without making any hacking rolls from node to node)? It would be inconvenient to go limp in the middle of a shopping mall, I suppose, but it would be equally as inconvenient to try to hack through multiple nodes to finally get to a node that is actually within scanning range of your target (considering the low signal rating that the majority of consumer electronics has, you'll have problems doing this).

But isn't "flying around" in VR actually hacking into each of the nodes you are passing through anyway? Basically, that should just be faster than doing it in AR but not different beyond that (aside from a +2 dice pool bonus if you were running hot).

I'm not trying to be a jerk on this, but I'm not sure I understand the distinction your are making between "flying around" in VR and doing the same thing in AR.
DireRadiant
Thanks for the awesome feedback:

Am I thinking correctly, if the Hacker is in the Mall, and searching for the Target in the Mall, the Hacker can:

Go VR, "fly" through all the nodes until the Hacker finds the Target. Of course the Hacker would be "out of body" so the Mall Rats could nibble on you, which could be good or bad depending on what kind of mall rats we are talking about.

Go AR, use a nearby Node to do a search through the Mall Nodes. This wouldn't be so much flying, as accessing the other remote nodes through the current mode, I envision this as similar to windows within windows. Probably should be sitting down while doing this, but still, even with the negative perception and other modifiers, you can watch the Mall Rats sneaking up on you, while you munch on your Nuke It burrito.

Go AR, Load up an agent into the nearb Node, and have it go do the search and report back to you? I don't think we covered this one yet.
hobgoblin
i dont see the need to go node to node just to find someone using AR, just query the local matrix uplink and i would guess that 99% of them are listed there nyahnyah.gif

if i can bring up the "website" of a company on the other side of the world using AR i should allso be able to access any node connected to the matrix without the need to go jumping from node to node.

only time i can see that being needed is if you dont have a matrix uplink within range and your target isnt within range of the comlink. so basicly it would be the backup plan.

still, this is me going by logic, not the rules nyahnyah.gif
DireRadiant
The "Finding someone in the Mall" scenario is along the lines of tracking down soemone whom you don't really know, but can identify visually. e.g. imagine your out "casing" a location, and you notice someone interesting, maybe they have some unusual gear or something, or talked to someone and you want to find out who they are. You've followed them for a bit, and they have entered good old Auburn Mall. In the meantime you haven't gotten close enough to scan them or get more identification. They walked to the mall, so Hacker didn't get a vehicle license etc...

So Hacker gets in the Mall, and decides to Hack the Mall network to see if the Target can be found, and then through the Mall network get the Targets ID, and then use the data trail to track the person rather then all this footwork. Hacker can:

Go VR, fastest, but huge penalties to act in meat body, and hack the nearest Node and start zipping around the Mall cameras and sensors till you can spot the Target. Then scan the target to see if you can pick up an identity out of the various PANs in the area of the Target.

Go AR and do as above, less penalties for doing so much AR in the Mall and slightly slower, you get less actions in AR then VR, but essentially the same actions.

Upload an agent to do the above and report back to you.

Once the target is found, and you know the PAN identifier, you can likely simply track the PAN through the Mall, without risking any direct observation. You can also start backtracking the data trail of that PAN through various other networks or areas you have passed through, and start various other investigations based on the identifier.

Anyway, that seems to be the gist of it. Does any of it seem unreasonable?

Vector
Sounds about right. And it illustrates just how complicated it could get if the Target were to be continuously Spoofing their PAN ID.
DireRadiant
There is added complexity, but I think the net effect is a good one. Definately incentive for interactive hacking. The Hacker is incorporated directly into the "action" and it isn't a matter of data research while "offline" from the rest of the teams activities. There is also the effect that almost the entire team is going to be hooked into AR and interacting with the Hacker. All good.

Now to figure out drones!
DireRadiant
Scenario. Rigger is using a nice roto drone to run surveillance to see who's been supplying the local gangers with ware and directions. Sure enough, who's that well dressed person that just left ganger HQ! Let's follow them and find out who they are! So Rigger is enjoying the one sunny Seattle day sipping a margherita on the balcony of some high rise, while the roto drone quietly follows the Target. So who is the Target? Rigger can:

Jump into the Drone and follow Target Home.

Jump into Drone, Hack the local network, VR or AR and scan for the Target's PAN, go from there, data trail etc.

Attach the Drone as a device to the local network, and use it to Hack, using VR or AR to scan for the Target PAN and go from there.

Attach the Drone as a device to the local network, and load an Agent amd software to do the above and report back.

One assumption is that the Rigger can do all this very remotely as long as there is sufficient Matrix connections between the Rigger and Drone. Is this correct, that now it seems far easier to do such long distance rigging?
Rotbart van Dainig
If you use the Matrix as repeater, indeed.
Vector
Drone size question... how big are the various drone categories? I believe the "large" steel lynx drones used to be human sized. What about the others? I couldn't seem to find anything in the book on those. Also, I seem to remember the microskimmer being referred to as "a trash can lid" and made the assumption on its size from there. Now, the book seems to imply the current version is nearly the smallest there is...

Also, what are the perception thresholds for noticing micro and mini drones?
Nikoli
well, the MCT FlyBot, is stated as being the size of a large insect.
Now, having seen some truly large insects (a few inches long) I also wonder about that.
Though the ocular drone cannot be very large as it has to exit via a space smaller than the part we see of an eye.
hahnsoo
QUOTE (Vector)
Now, the book seems to imply the current version is nearly the smallest there is...

It's very possible that the technology has improved to the point where you have frisbee or smaller-sized microskimmers. It is, after all, a new model.
Fortune
QUOTE (Nikoli)
Though the ocular drone cannot be very large as it has to exit via a space smaller than the part we see of an eye.

I thought that the Ocular Drone was the entire eyeball, You know, pluck it out of the socket and away it goes.
Penta
Eww. "Mom, that weird guy just pulled out his eye!"
Fortune
Exactly! biggrin.gif
Rotbart van Dainig
It's all fun until someone steps on it. wink.gif
Shadow_Prophet
QUOTE (Fortune)
QUOTE (Nikoli @ Sep 20 2005, 11:28 PM)
Though the ocular drone cannot be very large as it has to exit via a space smaller than the part we see of an eye.

I thought that the Ocular Drone was the entire eyeball, You know, pluck it out of the socket and away it goes.

I would assume so...since apparently if you have 2 implanted and take both out to use as drone's your effectively blind.
hobgoblin
time to pull a g'kar (or was it g'car?) and leave the drone somewhere.

better make sure i either have a spare eye i can pop in or some dark sunglasses.

hmm, i would kinda love to have this kinda tech right now. god knows where i would be leaving all kinds of microdrones nyahnyah.gif
Shadow_Prophet
QUOTE (hobgoblin)
time to pull a g'kar (or was it g'car?) and leave the drone somewhere.

better make sure i either have a spare eye i can pop in or some dark sunglasses.

hmm, i would kinda love to have this kinda tech right now. god knows where i would be leaving all kinds of microdrones nyahnyah.gif

Oh like we can't guess where you would leave them?
Penta
I had a stupid thought. Is it even possible to get multiple eyes beyond the first set? Not to have implanted with the first two, but just to keep around, so you can take an eye out, replace it with a spare, and use the former eye for surveillance?

(Can they just be inserted/removed on-the-go?)
Aku
QUOTE (Shadow_Prophet)
QUOTE (hobgoblin @ Sep 20 2005, 01:24 PM)
time to pull a g'kar (or was it g'car?) and leave the drone somewhere.

better make sure i either have a spare eye i can pop in or some dark sunglasses.

hmm, i would kinda love to have this kinda tech right now. god knows where i would be leaving all kinds of microdrones nyahnyah.gif

Oh like we can't guess where you would leave them?

now now, lets keep it to the elf porn thread...
NightRain
The rules state that most basic electronics don't have security and personal account user levels, they only have admin level. So the question is, does this mean that every basic consumer item out there has a +6 to it's hacking threshold, or is it a case of any access at all will give you admin rights?
Rotbart van Dainig
Both, actually - hacking it at all is a +6 threshold, but gives you admin rights. wink.gif
NightRain
Ok, next question. The books says to assume that nearly all commlinks/PANs will use encryption. Does this mean that you need to buy and load the encrypt program on your commlink, or is this device level wireless encryption a seperate beast we can assume is built in to most wireless devices?

If it's the former, I don't think it's safe to assume that most commlinks will be running encryption. If it does work this way, most (none?) of the archetypes in the book are running encryption on their commlinks, even if they've got an expensive model

If it's the latter, then what exactly does one use the encrypt program for?
Rotbart van Dainig
QUOTE (NightRain)
Does this mean that you need to buy and load the encrypt program on your commlink, or is this device level wireless encryption a seperate beast we can assume is built in to most wireless devices?

Not quite - after you installed the encryption on a file/device/connection, you don't need the Encryption Program to maintain it.

The Rating of the encryption is limited by the device installing it, but there is no such thing as build-in encryption.
NightRain
So you can encrypt the PAN communications via the commlink, then get rid of Encrypt without problems? In which case, I guess it's safe to assume that most of them come encrypted when purchased...
blakkie
QUOTE (NightRain)
So you can encrypt the PAN communications via the commlink, then get rid of Encrypt without problems? In which case, I guess it's safe to assume that most of them come encrypted when purchased...

Er, no. You Encrypt the communication when you open it (either end can set up this Encryption). Add a new device to your PAN? You have to run Encrypt again to set up that particular communication. Same thing when you set up a communication between you and another commlink, one of you has to load the Encrypt and run it to set up the protected communication.
NightRain
QUOTE (blakkie)
Er, no. You Encrypt the communication when you open it (either end can set up this Encryption). Add a new device to your PAN? You have to run Encrypt again to set up that particular communication. Same thing when you set up a communication between you and another commlink, one of you has to load the Encrypt and run it to set up the protected communication.

In which case, apparently most commlinks and the like aren't encrypted? If you have to buy and use a third party program, it seems to me that only the security conscious would bother, with everyone else being happy enough to let the node they are connecting to use encrypt if needed. As I mentioned earlier, few (none?) of the archetypes have it
blakkie
QUOTE (NightRain)
In which case, apparently most commlinks and the like aren't encrypted? If you have to buy and use a third party program, it seems to me that only the security conscious would bother, with everyone else being happy enough to let the node they are connecting to use encrypt if needed. As I mentioned earlier, few (none?) of the archetypes have it

As usual, the sample characters are gimps....except for the few cases where they break the creation rules. wink.gif But expect those rule breakings to be mostly fixed for the second printing.

It is really a matter of how paranoid the GM forces you to play. If he uses the rules to their potential and puts up enemies with r33t hacking skills that go for the kill by taking over your drones, stealing your data out of your commlinks, and actively screwing with your team member's PANs? Well you'll soon wonder why any 'runner would be without Encrypt and a selection of various ICE on their commlink. smile.gif
NightRain
I think I'll just house rule in a free copy of encrypt on all operating systems (or maybe just on all commlinks)
Rotbart van Dainig
Like every System comes with aa free Scan 1 integrated?
kigmatzomat
Your cellphone has no encryption; at least not enough to trump ROT-13. The masses probably have no encryption b/c they have nothing worth encrypting. Heck, even today the "only criminals will have encryption" is trotted out by the FBI.

My (possibly house) ruling is that client devices have enough CPU to manage encryption equal to their rating but they require a "parent" device (aka Comm) with encryption to utilize it. The Comm downloads the specific encryption algorithm to use and the client uses the largest key it can.
Shadow_Prophet
QUOTE (kigmatzomat)
Your cellphone has no encryption; at least not enough to trump ROT-13. The masses probably have no encryption b/c they have nothing worth encrypting. Heck, even today the "only criminals will have encryption" is trotted out by the FBI.

My (possibly house) ruling is that client devices have enough CPU to manage encryption equal to their rating but they require a "parent" device (aka Comm) with encryption to utilize it. The Comm downloads the specific encryption algorithm to use and the client uses the largest key it can.

Not completely true as their personal data will be encrypted but yeah in general your point is right on about encryption I think smile.gif.

kigmatzomat
QUOTE (Shadow_Prophet)

Not completely true as their personal data will be encrypted but yeah in general your point is right on about encryption I think smile.gif.

I'm thinking that in the case of the SIN verification, the Comm acts as the client device as the scanner provides the encryption routine. SIN data would be stored in some special, and probably proprietary, encrypted portion of the Comm.
Rotbart van Dainig
Those Files are encrypted (5 IIRC), but not specially stored.

Limiting the rating of the encryption to the Rating of the weaker device would house ruling indeed.
kigmatzomat
I think this is application of the RAW. It may be a house rule simply because I haven't found the *right* rules in the BBB and I haven't played it enough yet to be confident.

My interpretation is based on the Device Rating rules, which is effectively the value of all functions not specified but that are logical for the device to perform. Encryption is a reasonable expectation for devices to provide but it is is not detailed anywhere except the Encryption program.

Since there are no explicit rules for encrypting data between, say, a smartgun and a Comm with Encryption:5, I must fall back on the device rating, which for a smartgun is 3. IMO this means the communication between the Comm and the Smartgun will be encrypted but only at level 3. The Comm can use level 5 with other devices but not a off-the-shelf smartgun.

I'd expect Street Gear to have a cost for upgrading devices' encryption beyond their Device Rating. Unless, of course, I've missed a rule in the book somewhere.
NightRain
QUOTE (kigmatzomat)
I'd expect Street Gear to have a cost for upgrading devices' encryption beyond their Device Rating. Unless, of course, I've missed a rule in the book somewhere.

You can upgrade the response of the smartlink using the price list on p240. Then you can get your mits on an operating system with the same system rating as the new response rating. Then you can install encryption on it smile.gif

Whilst looking that up though, I couldn't help but notice that there is no way of buying an operating system with a system rating above 4. You can purchase extra response for your hardware, but is the only way of getting a better operating system than those listed in the book to code it?
Rotbart van Dainig
Neither Firewall, nor Encryption are limited by the Device installed on - but Encryption by the Device running the program, thus setting up the encryption.

Actually, System and Firewall may be purchased like other programs, see p. 288.
kigmatzomat
QUOTE (Rotbart van Dainig)
Neither Firewall, nor Encryption are limited by the Device installed on - but Encryption by the Device running the program, thus setting up the encryption.

That sentence doesn't parse to me. I get that you can load an Encryption program rating 42 on a System:1 Comm. However, all devices taking part in an encrypted conversation will need to run the encryption algorithms.

That encryption can't be more complicated than either device can handle. Sooooo....a stupid device can't run a high-end encryption routine.
Rotbart van Dainig
Not quite.

After you have encrypted a communication/file/access, there is neither need to run the Encryption Program anymore, nor is the Encryption Program limited by anything else than the the System of the Node setting it up, thus producing an Encryption Rating equal to that.

There are no other limitations written in the rules.
kigmatzomat
I agree there is no need for every device to have a copy of the Encrypt utility but I see nothing that says a device can communicate using encryption of a higher rating than the Device Rating. Matter of fact, the section on rigging that mentions encryption mentions upgrading drones in the same paragraph.

Barring errata, I don't see a pocket calculator being able to support Encryption:12 when talking to a mainframe.


Rotbart van Dainig
QUOTE (kigmatzomat)
I agree there is no need for every device to have a copy of the Encrypt utility but I see nothing that says a device can communicate using encryption of a higher rating than the Device Rating.

In fact, they do - ID-Data is stored and transmitted with an encryption of 5, regardless of the Response of the Commlink.
Even without such examples, as the only limitation is the device running the program, this is implicit.

QUOTE (kigmatzomat)
Matter of fact, the section on rigging that mentions encryption mentions upgrading drones in the same paragraph.

Where to be found?
Siege
SR 4's "augmented reality" is essentially the same schtick from "GitS: SAC", right?

Sorry, the thought just occured to me.

-Siege
cartoonlad
Hacker Joe has compromised someone's commlink and is eavesdropping on a call the owner makes with 3 successes. Who gets to detect the tap? Both commlinks involved in the call? Just the commlink that has been hacked into? If either of these, would it be System + Analyze (3) tests or extended tests? If extended tests, what's the interval? Or would one of the callers have to be actively searching for taps, requiring them to make a Computer + Analyze (3) test?

Sort of related to the Encrypt program discussion on this page: What programs come pre-installed with a standard OS? All common use programs at rating 1? At the rating of the system? None and you have to buy them separately?
cartoonlad
A character with Logic 4 and no Data Search skill has a commlink with a Browse 2 program running on it and needs to look up some readily-accessible data on the Matrix. Looking at the defaulting section in skills, he would roll 5 dice (Logic 4 -1 for defaulting + 2 for Browse rating) total to find this information. If the same character is actually trained in Data Search, say with rating 1, why would he then only roll 3 dice? Am I completely missing something?

Or should everything in the Wireless World section say something like use Logic + Data Search + Browse for basic data mining or Logic + Hacking + Exploit (Firewall, 1 IP) for the hacking on the fly test?
Ranneko
QUOTE (cartoonlad)
A character with Logic 4 and no Data Search skill has a commlink with a Browse 2 program running on it and needs to look up some readily-accessible data on the Matrix. Looking at the defaulting section in skills, he would roll 5 dice (Logic 4 -1 for defaulting + 2 for Browse rating) total to find this information. If the same character is actually trained in Data Search, say with rating 1, why would he then only roll 3 dice? Am I completely missing something?

Or should everything in the Wireless World section say something like use Logic + Data Search + Browse for basic data mining or Logic + Hacking + Exploit (Firewall, 1 IP) for the hacking on the fly test?

The program acts as the equivalent to a stat in this case, so using a rating 2 program and no skill, they would get 1 die as far as I can tell.
Rotbart van Dainig
The program simply would run on it's own, neither affected by Logic nor defaulting.
cartoonlad
I'm thinking of doing that -- having all OS come with rating 1 programs that anyone, even non-programmers or non-hackers could run. So the runner without a Data Search skill running Browse 1 would still get one die to roll when looking for screening times for Serenity this coming Friday.
Azralon
QUOTE (Rotbart van Dainig)
The program simply would run on it's own, neither affected by Logic nor defaulting.

There have been times when I've been using a crappy HTML editor and I realized that things would go a lot quicker and smoother if I just manually typed the code in myself.

That's one of those cases when it's better to default to Logic than to use a low-end program. smile.gif It's got real world precedent.
Shadow_Prophet
QUOTE (Azralon)
QUOTE (Rotbart van Dainig @ Sep 26 2005, 12:00 AM)
The program simply would run on it's own, neither affected by Logic nor defaulting.

There have been times when I've been using a crappy HTML editor and I realized that things would go a lot quicker and smoother if I just manually typed the code in myself.

That's one of those cases when it's better to default to Logic than to use a low-end program. smile.gif It's got real world precedent.

But thats more akin to programing which uses skill + attribute than to doing something on the matrix.

What you're asking to do is something like browsing the interenet for a site, without using a search engine at all. While its physicaly possible you can do that, its not recomended and its going to take forever and not be very good.
This is a "lo-fi" version of our main content. To view the full version with more information, formatting and images, please click here.
Dumpshock Forums © 2001-2012